EP2245604A2 - Method for verifying a code - Google Patents
Method for verifying a codeInfo
- Publication number
- EP2245604A2 EP2245604A2 EP09716754A EP09716754A EP2245604A2 EP 2245604 A2 EP2245604 A2 EP 2245604A2 EP 09716754 A EP09716754 A EP 09716754A EP 09716754 A EP09716754 A EP 09716754A EP 2245604 A2 EP2245604 A2 EP 2245604A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- control value
- code
- function
- remaining
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000006870 function Effects 0.000 claims abstract description 33
- 238000012795 verification Methods 0.000 claims abstract description 27
- 238000004364 calculation method Methods 0.000 claims abstract description 7
- 238000013478 data encryption standard Methods 0.000 description 7
- 230000005672 electromagnetic field Effects 0.000 description 3
- 230000001627 detrimental effect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1083—Counting of PIN attempts
Definitions
- the present invention relates to a method for verifying a personal code that can be used in particular to authorize transactions initiated between an integrated circuit card and a terminal such as a payment terminal or an automatic cash dispenser.
- An IC card such as a bank card, allows the storage of owner data, such as identification data and bank details.
- owner data such as identification data and bank details.
- this data is communicated by the card to the terminal so that the terminal can request the execution of operations on the bank account of the owner of the card.
- a secret code is stored in encrypted form in a non-volatile memory of the integrated circuit card and this code is requested by the terminal to the card holder who wishes to initiate a transaction.
- the secret code In order to facilitate its memorization by the card owners, the secret code generally has four digits allowing ten thousand combinations.
- a fraudster could be tempted to try all possible combinations until finding the secret code so that transactions can be made using the card.
- a ratification counter which limits the number of verification attempts to a predetermined number, usually three. If, after three attempts, the cardholder has failed to provide the correct code, the card becomes blocked and becomes unusable until the card holder has identified himself to the card issuer and has demonstrated to the card issuer that he is authorized to use the card. The maximum possible number of retries and the remaining number of retries are stored in nonvolatile memory on the card.
- a basic secret code verification method could provide for decrementing the remaining number of attempts after each verification failure.
- this operation like any operation of writing data in a non-volatile memory, requires a supply of energy supplied to the integrated circuit by the reader. One would then be exposed to the risk that a fraudster cut off the power supply of the integrated circuit of the card after each unsuccessful attempt to prevent the decrementation of the remaining number of attempts.
- the invention proposes a verification method that is reliable and energy efficient.
- the invention relates to a method for verifying a code by means of a memory containing random numbers each associated with a sequence number, the results of a calculation performed on each random number using a function bijective and the code as the specification parameter of the bijective function, a maximum possible number of verification attempts, a theoretical number remaining of verification attempts and a control value which is associated with a serial number, the method comprising the steps of:
- control value and the random number corresponding to the order number associated with the control value; if the control value and said random number are identical, take as a real number of verification attempts the maximum possible number; if the control value is different from said random number, take as real number remaining the theoretical number remaining,
- control value and the sequence number associated with it make it possible:
- the bijective function can be a DES or other type of encryption function whose specification parameter constitutes the encryption key.
- the identity of the control value and the corresponding random number means that the previous check was successful.
- the remaining number of retries is then equal to the maximum possible number of attempts.
- a difference between the control value and the random number reveals that the previous check was a failure.
- the remaining number of attempts is then equal to the remaining theoretical number of attempts.
- parameter of specification is meant a parameter such that for a first value of the parameter the function gives a first result and, for a second value of the parameter different from the first value of the parameter, the function gives a second result different from the first one. , all other terms being equal.
- the implementation of the method according to the invention therefore requires only one write operation that precedes the verification.
- the invention is here described in application to a data card comprising a card body 1 in which is encapsulated an integrated circuit 2 defining in known manner a microprocessor connected to a volatile memory and a memory non-volatile symbolized in 3.
- the structure of the integrated circuit and its mode of operation are conventional and not directly related to the invention, so they will not be described in more detail here.
- the integrated circuit 2 is connected to means of communication with the outside. These means, which are not shown in the figure, are for example contact areas allowing, by contact with drivers of a card reader, to exchange information with a terminal, such as a connected payment terminal. to the card reader.
- the communication means comprise an antenna embedded in the card body for powering the processor and exchanging information with a terminal when the card is in an electromagnetic field produced by a transceiver connected to said terminal.
- the nonvolatile memory 3 contains a program ensuring the operation of the card and data used by the program to ensure the operation of the card.
- the operation of the card requires the implementation of a PIN personal code.
- data stored in the non memory volatile 3 are:
- the random numbers ai are of the number n, i varying from 1 year, the results ⁇ piN (oti) of a calculation carried out on each random number using a biject function ⁇ with PIN code as specification parameter,
- M PIN
- ⁇ is an easily invertible encryption function using a Data Encryption Standard (DES) algorithm in which the encrypted PIN code is used as an encryption key.
- DES Data Encryption Standard
- the PIN code has been previously encrypted by a DES algorithm using a key K as an encryption key
- the key is defined in the non-volatile memory of the card and its value is specific to each card. Verification of a submitted code will now be described.
- the integrated circuit 2 of the card is connected to a terminal 10 equipped with a card reader 11, a keyboard 12 on which the card holder can type his code and a screen 13 on which messages are displayed to the card holder.
- the maximum possible number of attempts in this example is three, so that the value PTL is three and the card is blocked when the value PTC is zero.
- the number n of random numbers eu is at least equal to PTL (here n is 3).
- the terminal When the microprocessor 2 is in communication with the terminal and the card holder wishes to initiate a transaction requiring identification by giving his personal code, the terminal first interrogates the microprocessor 2 to obtain the remaining number of attempts verification, noted PTC, which will be displayed on the screen 13 to the card holder to let him know how many attempts he has to check his code.
- PTC the remaining number of attempts verification
- the program executed by the microprocessor then compares the control value ⁇ i and the random number Cd corresponding to the order number i associated with the control value ⁇ i.
- the microprocessor assigns the remaining number updated PTC the maximum possible number, ie the value PTL. On the other hand, if the control value ⁇ i is different from the random number cti, the program assigns the value PTC to the remaining number updated PTC.
- the terminal 10 displays a message asking the cardholder to submit a code using the keyboard 12 and transmits the submitted code M to the program executed by the medium. croprocessor.
- the program encrypts the submitted code M using the DES encryption algorithm and the key K stored in the card.
- An order number i is then selected, here by draw.
- the inverse de '1 function of the invertible bijective function ⁇ is a decryption function based on the DES algorithm in which the encrypted subject code M serves as a decryption key.
- the program then stores in nonvolatile memory 3 the order number i recently selected, the control value ⁇ i lastly calculated and a new value PTC of the theoretical number remaining corresponding to the value of the real number remaining decremented by one.
- the verification of the submitted code M is then performed, namely that the program compares the value ⁇ i lastly stored in nonvolatile memory 3 to the random number or corresponding to the order number i recently recorded in the nonvolatile memory 3.
- control value ⁇ i is identical to the random number or, then the submitted code M is identical to the PIN code and the transaction is authorized. Conversely, if the submitted code M is different from the PIN code, the program informs the terminal 10 that the transaction is denied. The terminal then requests the program the remaining number updated PTC attempts.
- the card undergoes an initialization phase before its first use.
- This initialization phase consists in recording in the nonvolatile memory 3 of the card an order number i selected and as control value ⁇ i the corresponding random number ai.
- control value ⁇ i is necessarily equal to the random number or corresponding to the order number i associated with the control value ⁇ i so that the card automatically returns the PTL value as the number remaining updated.
- the encryption of the secret code and the code submitted is not essential to the implementation of the method according to the invention.
- the order number i may be selected by other means such as a calculation and in particular an incrementation or a decrementation of the previously selected sequence number.
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0800491A FR2926912B1 (en) | 2008-01-30 | 2008-01-30 | METHOD OF VERIFYING A CODE |
PCT/FR2009/000094 WO2009109719A2 (en) | 2008-01-30 | 2009-01-28 | Method for verifying a code |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2245604A2 true EP2245604A2 (en) | 2010-11-03 |
EP2245604B1 EP2245604B1 (en) | 2019-05-29 |
Family
ID=39721955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09716754.8A Active EP2245604B1 (en) | 2008-01-30 | 2009-01-28 | Method for verifying a code |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2245604B1 (en) |
FR (1) | FR2926912B1 (en) |
WO (1) | WO2009109719A2 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2601476B1 (en) * | 1986-07-11 | 1988-10-21 | Bull Cp8 | METHOD FOR AUTHENTICATING EXTERNAL AUTHORIZATION DATA BY A PORTABLE OBJECT SUCH AS A MEMORY CARD |
JP2002523831A (en) * | 1998-08-17 | 2002-07-30 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Data transfer device with test means for testing authorization when accessing a data reader |
CA2392037A1 (en) * | 1999-11-22 | 2001-05-31 | Ascom Hasler Mailing Systems, Inc. | Generation and management of customer pin's |
FR2810481B1 (en) * | 2000-06-20 | 2003-04-04 | Gemplus Card Int | CONTROL OF ACCESS TO A DATA PROCESSING MEANS |
DE10247794B4 (en) * | 2002-10-14 | 2008-05-08 | Giesecke & Devrient Gmbh | Managing a failed trial counter in a portable disk |
-
2008
- 2008-01-30 FR FR0800491A patent/FR2926912B1/en active Active
-
2009
- 2009-01-28 WO PCT/FR2009/000094 patent/WO2009109719A2/en active Application Filing
- 2009-01-28 EP EP09716754.8A patent/EP2245604B1/en active Active
Non-Patent Citations (1)
Title |
---|
See references of WO2009109719A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2009109719A2 (en) | 2009-09-11 |
FR2926912B1 (en) | 2010-03-05 |
FR2926912A1 (en) | 2009-07-31 |
WO2009109719A3 (en) | 2010-01-07 |
EP2245604B1 (en) | 2019-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0252849B2 (en) | Method for authenticating external authorization data by a portable object such as a memory card | |
EP0414314B1 (en) | Single-number generation method for micro-chip card and use of same for the cooperation of the card with a host-system | |
EP0426541B1 (en) | Method of protection against fraudulent use of a microprocessor card and device for its application | |
CA2046289C (en) | Method for generating random numbers in a data processing system and system using said method | |
EP2388949B1 (en) | Method of managing electronic devices, such as integrated circuits, with internal generation of a personal authentication key | |
WO1998028719A1 (en) | Method for secure transfer of data by a communication network | |
EP2388948B1 (en) | Method and system for access to an integrated circuit comprising a personal authentication key | |
FR2697929A1 (en) | Security protocol for information exchange with portable object - using exchange and updating of signatures, achieved through algorithm, certificate and random number | |
EP2245604B1 (en) | Method for verifying a code | |
EP1142193A1 (en) | Method for secure data loading between two security modules | |
FR2945141A1 (en) | Contactless payment application e.g. local payment application, management method for mobile telephone, involves finalizing payment session if verification indicator is informed, and resetting indicator when session is completed | |
EP0829831B1 (en) | Card authentication method | |
EP0434550B1 (en) | Method of generating a pseudo-random number in a portable electronic objects system and a system for carrying out the method | |
EP0910839B1 (en) | Method for safely storing credit units in a smart card and monetary transaction system using same | |
FR3042626A1 (en) | METHOD AND SYSTEM FOR SECURE ACCESS AND DISCRIMINATION TO INTEGRATED CIRCUIT SERVICES BY DIVERSIFYING A SINGLE ROOT KEY | |
FR2757979A1 (en) | DYNAMIC DATA INTERPRETATION PROCESS FOR A CHIP CARD | |
EP1965342A1 (en) | Method of conducting a transaction between a payment module and a security module | |
FR3077150A1 (en) | METHOD FOR CONTROLLING DEPENDENCY RULES OF OBJECTS UPDATED IN A MICROCIRCUIT, AND CORRESPONDING DEVICE | |
WO2017103484A1 (en) | Method for securing a transaction from a mobile terminal | |
FR2745404A1 (en) | Portable smart card with personalisation and lottery function to encourage return | |
WO2013117726A2 (en) | Payment system, payment terminal of said system, and associated payment method | |
FR2822264A1 (en) | System for controlling access to commercial sites and for securing commercial transactions based on use of a removable data drive and associated removable data disk, so that a chip card reader is not required | |
FR2892875A1 (en) | METHOD OF SECURING PAYMENTS BY CUTTING AMOUNTS | |
FR2989547A1 (en) | System for use in e.g. bank card, to secure bank transactions through e.g. wide area network, has microcontroller powered through contact pad with terminal that is connected to wide area network to generate authentication message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20100726 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: MORPHO |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20170309 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602009058557 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G07F0007100000 Ipc: G06Q0020340000 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: IDEMIA IDENTITY & SECURITY FRANCE |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 20/40 20120101ALI20181119BHEP Ipc: G07F 7/10 20060101ALI20181119BHEP Ipc: G06Q 20/34 20120101AFI20181119BHEP |
|
INTG | Intention to grant announced |
Effective date: 20181206 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 20/40 20120101ALI20181119BHEP Ipc: G07F 7/10 20060101ALI20181119BHEP Ipc: G06Q 20/34 20120101AFI20181119BHEP |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: DECROIX, DAVID Inventor name: GONCALVES, LOUIS-PHILIPPE Inventor name: ROUDIERE, GUILLAUME |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602009058557 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1138710 Country of ref document: AT Kind code of ref document: T Effective date: 20190615 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190930 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190829 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190830 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190829 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1138710 Country of ref document: AT Kind code of ref document: T Effective date: 20190529 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602009058557 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
26N | No opposition filed |
Effective date: 20200303 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20200128 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20200131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200128 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200128 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200131 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200131 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200128 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190529 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20190929 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230428 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20231219 Year of fee payment: 16 Ref country code: FR Payment date: 20231219 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20231219 Year of fee payment: 16 |